layer 2 technology andres, wen-yuan liao department of computer science and engineering de lin...

Post on 28-Dec-2015

212 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Layer 2 Technology

Andres, Wen-Yuan Liao

Department of Computer Science and Engineering

De Lin Institute of Technology

andres@dlit.edu.tw

http://www.cse.dlit.edu.tw/~andres

Basics of Token Ring

Overview of Token Ring and its variants

Token Ring frame format

Token Ring MAC

Token Ring signaling

Token Ring media and physical topologies

TR frame format

TokensTokens are 3 bytes in length a start delimiter, an access

control byte, and an end delimiter

TR frame format

Access Control ByteThe priority and reservation field,

and a token and monitor bitThe token bit : data/command

frameA monitor bit determines whether

a frame is continuously circling the ring

TR frame format

Data/Command Frames Data frames: data information Command frames: control

informationFrame control byte indicates

Data or control informationThe type of control information

Token Ring MAC

Move a token around the network

Possession of the token grants the right to transmit data

Hold the token for a maximum period of time

Busy token/Free token

Token Ring MAC

No collisions

DeterministicCalculate the maximum time that

will pass before any end station will be able to transmit

TR MAC - Priority System

The priority field and the reservation field.

Only stations with higher or equal priority can seize that token

TR MAC - Priority System

Only stations with higher priority can reserve the token for the next network pass

Stations that raise a token's priority level must reinstate the previous priority

TR MAC - ManagementDetect and compensate for network faults

Active monitorRemove continuously circulating frames from th

e ring

Active MSAUs (multi-station access units) Check for problems, and to selectively remove

stations

Beaconing Detects and tries to repair network faults

When a station detects a serious problem with the network (e.g. a cable break) it sends a beacon frame

The beacon frame defines a failure domain Include the station that is reporting the failure, it

s nearest active upstream neighbor (NAUN), and everything in between

Beaconing initiates a process called autoreconfigurationNodes within the failure domain automatically p

erform diagnostics

Token Ring signaling

Manchester encoding 0 : a high-to-low transition1: a low-to-high transition

Differential 1: no polarity change at the start

of the bit time 0: a polarity change at the start of

the bit time

TR media and physical topologies

Stations are directly connected to MSAUs, and can be wired together to form one large ringPatch cables connect MSAUs to other MSAUs that are adjacent to itLobe cables connect MSAUs to stationsMSAUs include bypass relays for removing stations from the ring

Basics of Fiber Distributed Data Interface (FDDI)

Overview of FDDI and its variants FDDI format FDDI MAC FDDI signaling FDDI media

Overview of FDDIANSI X3T9.5 standards committee Backbone technology Media Access Control (MAC)defines how the medium is accessed

Physical Layer Protocol (PHY) defines data encoding/decoding procedures

Physical Layer Medium (PMD) defines the characteristics of the transmission

medium

Station Management (SMT) defines the FDDI station configuration

FDDI format

Frame status – Determine if an error occurred

and if the frame was recognized and copied by a receiving station

FDDI MAC

Move a token around the network

Possession of the token grants the right

A maximum period of token holding time

No collisions

A new token can be released when  the frame transmission has finished

Guaranteed their turn to transmit

Reliable

FDDI MAC - Synchronous

Synchronous bandwidth is allocated to those stations requiring continuous transmission capabilityVoice and video informationThe remaining bandwidth is used for

asynchronous transmissions

The FDDI SMT specification defines a distributed bidding scheme to allocate FDDI bandwidth

FDDI MAC - Asynchronous

Be allocated using an 8-level priority schemeEach station is assigned an

asynchronous priority level

FDDI also permits extended dialoguesStations may temporarily use all

asynchronous bandwidth

FDDI MAC - Asynchronous

The FDDI priority mechanism can lock out stations that cannot use synchronous bandwidth, and that have too low an asynchronous priority

FDDI media

100 Mbps, token-passing, dual-ring LAN that uses a fiber-optic transmission mediumAdvantages security reliability speed

Two specified types of fiber: single-mode (also mono-mode); and multi-mode

Modes can be thought of as bundles of light rays entering the fiber at a particular angle

FDDI media

Single-mode fiber

One mode of light to propagate through the fiber

Higher bandwidth

Greater cable run distances

Inter-building connectivity

Laser

Multi-mode fiberMultiple modes of light to propagate Multiple modes of light propagating through fiber may travel different distances, depending on their entry anglesIntra-building connectivityUses LEDs as the light-generating devices

Dual Rings FDDI

Traffic on each ring travels in opposite directionsThe rings consist of two or more point-to-point connections between adjacent stationsThe primary ring: data transmissionThe secondary ring: back up

DAS/SAS

Class A, or dual attachment stations (DAS)

Class B, or single-attachment stations (SAS), attach to one ring

Ethernet and IEEE 802.3

Comparing Ethernet and IEEE 802.3

Ethernet family tree

Ethernet frame format

Ethernet MAC

Ethernet signaling

Ethernet 10BASE-T media and topologies

Comparing Ethernet and IEEE 802.3

Most widely used local area network Carry sporadic, occasionally heavy traffic at high peak data rates Listen before talk/Listen while talkCollision/Back off algorithmBroadcast networks

100BASE-TX/10BASE-T

18 varieties of Ethernet

Ethernet MAC

Listen-before-transmit mode

Listen-while-transmit mode

Ethernet is a connectionless network architecture and is referred to as a best-effort delivery system

CollisionThe amplitude of the signal on the networking media will increase

When a collision occurs, each transmitting device will continue to transmit data for a short time

Backed off for a random period of time

Ethernet signaling

Manchester encoding

10BASE-T 4 wires 1 pair of wires: transmitting

data1 pair of wires: receiving data

Ethernet 10BASE-T media and topologies

An active hub connects the networking media as well as regenerates the signalA passive hub is a device used to connect networking media and does not regenerate a signal

Start Topology

Advantages The easiest to design and installEase of maintenance Easy to modify and troubleshootGreater reliability

Start Topology

Disadvantages Limit one device per run Single point of failure (hub)

TIA/EIA-568-A specification

Maximum length of horizontal cabling : 90 mThe maximum length for patch cords at the telecommunications outlet/connector is 3 m the maximum length for patch cords/jumpers at the horizontal cross-connect is 6 m.

TIA/EIA-568-A specification

If a signal travels beyond the specified maximum distance, there is no guarantee that when it reaches a NIC card, the NIC card will be able to read it.

Layer 2 Devices

NICs

Bridges

Bridge Layer 2 operations

Switches

Switch Layer 2 operations

Bridge Layer 2 operations

Upper-layer protocol transparency

Bridges filter network traffic by only looking at the MAC address, not protocols

Reduce large collision domains

Bridge Layer 2 operations

Bridges work best where traffic is low from one segment of a network to other segments

When no idea, the source sends out a broadcast to all devices on a network.

Switches

Alleviates congestion in Ethernet LANs by reducing traffic and increasing bandwidth

Switch Layer 2 operations

LAN switches are considered multi-port bridges with no collision domain, because of microsegmentation

The frame is sent to the port of the receiving station prior to the entire frame entering the switch

Switch Layer 2 operations

Virtual circuit: it exists only when needed, and is established within the switch.

Because switching is performed in hardware instead of in software, it is significantly faster.

Effects of Layer 2 Devices on Data Flow

Ethernet LAN segmentation Bridge segmentation of a collision domain Switch segmentation of a collision domain Router segmentation of a collision domain Teaching topology segmentation by bridges, switches, and routers

Ethernet LAN segmentation

Isolate traffic between segmentsCreate smaller collision domain Bridge/SwitchAct as a firewall for some

potentially damaging network errors

Switch (to Bridge)

Switches are significantly faster (hardware)A 10 Mbps Ethernet LAN and a 100 Mbps Ethernet LAN can be connected by using a switch Higher port densities Cut-through switching Reduce collisions and increase bandwidth

Router

Smaller collision domains and smaller broadcast domains

Perform bridging and switching functions

Best path selection

Router

Connect different networking media, and different LAN technologies Connect LANs running different protocols (IP vs. IPX vs. AppleTalk) and can have serial connections to WANs

Bridge

Bridges increase the latency (delay) in a network by 10-30%

A store-and-forward device

Compute the cyclic redundancy check (CRC) before forwarding

Switch segmentation

The available bandwidth can reach close to 100% Ethernet networks perform best when kept under 30-40% of full capacity CSMA/CD

Micro-segments: create collision free domains

Router segmentation

Operates at the network layer, and bases all of its forwarding decisions on the Layer 3 protocol address

Operate with a higher rate of latency

Determine the best path for forwarding them to their destinations

Troubleshooting workstations

It is best to start troubleshooting at Layer 1

Summary

Token ring

FDDI

EthernetBridgeSwitch

top related